Anonymous port scanning: Performing network reconnaissance through Tor

Rodney Rohrmann, Mark W. Patton, Hsinchun Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages217
Number of pages1
ISBN (Electronic)9781509038657
DOIs
StatePublished - Nov 15 2016
Event14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015 - Tucson, United States
Duration: Sep 28 2016Sep 30 2016

Other

Other14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015
CountryUnited States
CityTucson
Period9/28/169/30/16

Fingerprint

Scanning
Retaliation

Keywords

  • Anonymization
  • Scanning
  • Tor

ASJC Scopus subject areas

  • Information Systems
  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Rohrmann, R., Patton, M. W., & Chen, H. (2016). Anonymous port scanning: Performing network reconnaissance through Tor. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016 (pp. 217). [7745475] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISI.2016.7745475

Anonymous port scanning : Performing network reconnaissance through Tor. / Rohrmann, Rodney; Patton, Mark W.; Chen, Hsinchun.

IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 217 7745475.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rohrmann, R, Patton, MW & Chen, H 2016, Anonymous port scanning: Performing network reconnaissance through Tor. in IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016., 7745475, Institute of Electrical and Electronics Engineers Inc., pp. 217, 14th IEEE International Conference on Intelligence and Security Informatics, ISI 2015, Tucson, United States, 9/28/16. https://doi.org/10.1109/ISI.2016.7745475
Rohrmann R, Patton MW, Chen H. Anonymous port scanning: Performing network reconnaissance through Tor. In IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 217. 7745475 https://doi.org/10.1109/ISI.2016.7745475
Rohrmann, Rodney ; Patton, Mark W. ; Chen, Hsinchun. / Anonymous port scanning : Performing network reconnaissance through Tor. IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 217
@inproceedings{0df1ee42e3384fdcae1fd560e3eaacd3,
title = "Anonymous port scanning: Performing network reconnaissance through Tor",
abstract = "The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.",
keywords = "Anonymization, Scanning, Tor",
author = "Rodney Rohrmann and Patton, {Mark W.} and Hsinchun Chen",
year = "2016",
month = "11",
day = "15",
doi = "10.1109/ISI.2016.7745475",
language = "English (US)",
pages = "217",
booktitle = "IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Anonymous port scanning

T2 - Performing network reconnaissance through Tor

AU - Rohrmann, Rodney

AU - Patton, Mark W.

AU - Chen, Hsinchun

PY - 2016/11/15

Y1 - 2016/11/15

N2 - The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.

AB - The anonymizing network Tor is examined as one method of anonymizing port scanning tools and avoiding identification and retaliation. Performing anonymized port scans through Tor is possible using Nmap, but parallelization of the scanning processes is required to accelerate the scan rate.

KW - Anonymization

KW - Scanning

KW - Tor

UR - http://www.scopus.com/inward/record.url?scp=85004178583&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85004178583&partnerID=8YFLogxK

U2 - 10.1109/ISI.2016.7745475

DO - 10.1109/ISI.2016.7745475

M3 - Conference contribution

AN - SCOPUS:85004178583

SP - 217

BT - IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -